Sciweavers

729 search results - page 69 / 146
» A practical method for courseware evaluation
Sort
View
SBBD
2003
135views Database» more  SBBD 2003»
14 years 11 months ago
Privacy Preserving Clustering by Data Transformation
Despite its benefit in a wide range of applications, data mining techniques also have raised a number of ethical issues. Some such issues include those of privacy, data security,...
Stanley R. M. Oliveira, Osmar R. Zaïane
TMI
2010
155views more  TMI 2010»
14 years 4 months ago
3D Forward and Back-Projection for X-Ray CT Using Separable Footprints
The greatest impediment to practical adoption of iterative methods for X-ray CT is the computation burden of cone-beam forward and back-projectors. Moreover, forward and back-proje...
Yong Long, Jeffrey A. Fessler, James M. Balter
CVPR
2011
IEEE
14 years 1 months ago
Compact Hashing with Joint Optimization of Search Accuracy and Time
Similarity search, namely, finding approximate nearest neighborhoods, is the core of many large scale machine learning or vision applications. Recently, many research results dem...
Junfeng He, Regunathan Radhakrishnan, Shih-Fu Chan...
INFOCOM
2011
IEEE
14 years 1 months ago
Fine-grained location-free planarization in wireless sensor networks
—Extracting planar graph from network topologies is of great importance for efficient protocol design in wireless ad hoc and sensor networks. Previous techniques of planar topol...
Dezun Dong, Yunhao Liu, Xiangke Liao, Xiang-Yang L...
CVPR
2011
IEEE
14 years 5 months ago
2D Nonrigid Partial Shape Matching Using MCMC and Contour Subdivision
Shape matching has many applications in computer vision, such as shape classification, object recognition, object detection, and localization. In 2D cases, shape instances are 2D c...
Y. Cao, Z. Zhang, I. Czogiel, I. Dryden, S. Wang